General

  • Target

    ee8691df830c8049a82b6742c7b87ab9_JaffaCakes118

  • Size

    139KB

  • Sample

    240920-1433ka1elq

  • MD5

    ee8691df830c8049a82b6742c7b87ab9

  • SHA1

    fc0b9af297d018fd313934248f5e7e9aac4752da

  • SHA256

    a973fb7943766b57cd43a3411ebc0e4f2526142e27a0c7e259a0fdabd30a5596

  • SHA512

    52cf16dc38ff9391c343b4a3058b3da0d51a4b2a89ec3a066d61d0596fb01e9c239b01a7ec1cb9d87267555e467c9511ebc16eb0dbc2a0618077745109724eaf

  • SSDEEP

    1536:mxRD3bNqfNpu39IId5a6XP3Mg8afyqsTqc380Y:ER1qf69xak3MgxyHqI80Y

Score
10/10

Malware Config

Extracted

Language
ps1
Source
URLs
exe.dropper

http://edu.jmsvclass.com/wp-includes/sZmjSq/

exe.dropper

http://darkblessing.net/e4wftkpn/KNAO9/

exe.dropper

http://trancisconsulting.com/wp-admin/EEoF/

exe.dropper

http://devanyastore.com/wp-content/9J56juA/

exe.dropper

http://healthcureathome.com/ALFA_DATA/iKSdCK6/

exe.dropper

http://www.szwymall.com/wp-content/j29mvS/

exe.dropper

http://www.jornco.com/wp-admin/UT0xBJw/

Targets

    • Target

      ee8691df830c8049a82b6742c7b87ab9_JaffaCakes118

    • Size

      139KB

    • MD5

      ee8691df830c8049a82b6742c7b87ab9

    • SHA1

      fc0b9af297d018fd313934248f5e7e9aac4752da

    • SHA256

      a973fb7943766b57cd43a3411ebc0e4f2526142e27a0c7e259a0fdabd30a5596

    • SHA512

      52cf16dc38ff9391c343b4a3058b3da0d51a4b2a89ec3a066d61d0596fb01e9c239b01a7ec1cb9d87267555e467c9511ebc16eb0dbc2a0618077745109724eaf

    • SSDEEP

      1536:mxRD3bNqfNpu39IId5a6XP3Mg8afyqsTqc380Y:ER1qf69xak3MgxyHqI80Y

    Score
    10/10
    • Process spawned unexpected child process

      This typically indicates the parent process was compromised via an exploit or macro.

    • Blocklisted process makes network request

    • Drops file in System32 directory

MITRE ATT&CK Enterprise v15

Tasks